802.1X Port-Based Authentication: 1st Edition (Hardback) book cover

802.1X Port-Based Authentication

1st Edition

By Edwin Lyle Brown

Auerbach Publications

252 pages | 30 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781420044645
pub: 2006-12-19
SAVE ~$15.75
Currently out of stock
eBook (VitalSource) : 9780429117305
pub: 2006-12-19
from $49.48

FREE Standard Shipping!


Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL).

The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview.

Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today’s computer networks using this particular network protocol.


“The first part of this book explain the 802.1X network protocol and the components involved in implementing it in a network. EAP packets, the Radius authentication server, management information base (MIB) elements, and configuration commands within the Cisco environment are discussed. The second half describes an example implementation on Cisco devices and walks through scenario where visitors connect to the network, users connect to a foreign network, devices cannot function as a supplicant, and IP telephony is added. …”

— In Book News Inc., June 2007

Table of Contents


What Is 802.1X and Why Should I Care?

The History and Technical Documents

How Does It Work?

Technical Discussion

EAPOL, EAP and EAP Methods



Security Concerns

Configuring 802.IX


Design, Implementation and Troubleshooting


A Very Simple Network

What If It Didn’t Work Right?


What Do I Do With My Printers and Servers?

Unplanned Expansion

Expand to Wireless

IP Telephony

A Not So Simple Network

Design Recap


Subject Categories

BISAC Subject Codes/Headings:
COMPUTERS / Networking / General
COMPUTERS / Security / General